LEADER 02883nam a22003617i 4500001 99131770794506421 005 20260217135630.0 006 m o d 007 cr ||||||||||| 008 260217t20272027cau o 000 0 eng d 035 (CaSebORM)9798341652934 035 (CKB)45390868700041 035 (OCoLC)1573517219 035 (OCoLC-P)1573517219 035 (EXLCZ)9945390868700041 040 OCoLC-P |beng |erda |epn |cOCoLC-P 050 4 TK5105.59 082 04 005.8 |223/eng/20260217 100 1 Henry, Kevin M., |eauthor. |1https://id.oclc.org/worldcat/entity/E39PCjCrQYRcwwTKvfdf4hdjVK 245 10 Certified Information Systems Security Professional (CISSP) study guide / |cby Kevin Henry. 250 [First edition]. 264 1 Santa Rosa, CA : |bO'Reilly Media, Inc., |c[2027] 264 4 |c©2027 300 1 online resource (500 pages) 336 text |btxt |2rdacontent 337 computer |bc |2rdamedia 338 online resource |bcr |2rdacarrier 520 CISSP certification is the gold standard of cybersecurity certifications, and it's often a prerequisite for advancement in an information security career. If you're thinking of taking the CISSP exam, or if you just want to get up-to-date on current industry standards, this engaging and comprehensive guide will give you all the necessary resources. With his work for ISC2, author Kevin Henry may have taught more CISSP candidates than anyone in the world. His crystal-clear explanations render complex security concepts easily digestible, and his emphasis on real-world examples makes each topic relevant and concrete. You'll dive deep into the eight domains of the CISSP as well as the most current threats, technologies, and best practices in today's industry. You'll also learn proven strategies for successful prep, and tips to boost your confidence in the exam or on the job. Effectively prepare for and successfully complete the CISSP exam Review the fundamental principles and best practices that form the foundation of information security Understand the strategic role of information security in supporting business objectives Analyze complex security scenarios and make risk-based decisions by integrating knowledge from multiple domains Identify and remediate security vulnerabilities using a systematic approach that considers the entire security lifecycle Implement security controls and countermeasures that align with industry frameworks. 588 OCLC-licensed vendor bibliographic record. 650 0 Computer networks |xSecurity measures |xExaminations |vStudy guides. 650 0 Telecommunications engineers |xCertification. 906 BOOK